Salesforce Snafu: OAuth Token Heist Leaves Companies in a Drift!
Google reports recent Salesforce breaches involved stolen OAuth tokens from Salesloft’s Drift app. While separate from other high-profile attacks, it’s a “token” of concern. Salesforce users, check your integrations before your sales pitches drift into the wrong hands!

Hot Take:
Looks like the Drift app has been drifting a bit too far off course, leading to a tidal wave of Salesforce-related breaches! Who knew that automating your sales processes could lead to automating your headaches too? It seems like the attackers have been taking OAuth tokens for a joyride, accessing Salesforce databases and causing quite the ruckus. At this point, the only thing more scrambled than an egg are the IT teams trying to re-authenticate their connections. Let’s hope for smoother sails ahead!
Key Points:
- OAuth tokens from the Salesloft Drift app were stolen to access Salesforce databases.
- The breaches are being treated separately from other high-profile Salesforce data thefts.
- Salesloft and Google Threat Intelligence Group have revoked all active access tokens.
- Drift app removed from AppExchange pending security assurance.
- Organizations using Drift with Salesforce urged to take immediate remediation steps.